Friday, March 9, 2012

Guess Paper Bank Officer Exam for 11th March 2012

Latest Updated Exam / Guess Papers - http://syllabus123.blogspot.com/

Bank Exam Paper / Model Paper for Specialist Computer / IT Officer Scale - I /II
(EXAMINATION to be held on 11th March 2012 )
1. The _____ states that a foreign key must either match a primary key value in another relation or it must be null.
(a) entity integrity rule


2. An applet __________
(c) is a compiled program that usually runs on the client

3. A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.
(e) None of these

4. Which error detection method uses one’s complement arithmetic?
(b) Checksum

5. A result of a computer virus can not lead to ___.
(b) Mother Board Crash

6. The network interface card of LAN is related to following layer of OSI Model-
(e) All of these

7. Which of the following does not describe a data warehouse?
(d) Updateable

8. Which of the following is true ?
(a) Logical design is software-dependent

9. A range check _____
(c) determines whether a number is within a specified limit

10. The total set of interlinked hypertext documents worldwide is-
(c) WWW

11. With the object-oriented (OO) approach, an object encapsulates, or_____.a programmer.
(b) hides, the details of an object from

12. Every computer connected to an intranet or extranet must have a distinct_____
(c) IP address

13. A table of bits in which each row represents the distinct values of a key?
(b) Bitmap index

14. The degree of detail that should be incorporated into a database depends on what?
(b) The type of database

15. The ___ converts digital signals to analog signals for the purpose of transmitting data over telephone lines.
(a) Modem

16. Before a package can be used in a java program it must be___.
(c) imported

17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction___.
(b) begin the line with double slashes (/ /)

18. Programming language built into user programs such as Word and Excel are known as____
(c) object-oriented languages

19. Firewalls are used to protect against___.
(a) Unauthorized Attacks

20. This is a standard way for a Web server to pass a Web user’s request to an application program and to receive data back to forward to the user-
(e) Common gateway interface

21. Three SQL, DDL, CREATE commands are__.
(d) Schema, Table and View

22. Data are ________ in client/server computing.
(c) sent only upon the client’s request

23. Which of the following will not eliminates the ambiguities of a null value?
(d) Define supertypes

24. The____directory is mandatory for every disk.
(a) Root

25. This is a group of servers that share work and may be able to back each other up if one server fails.
(b) Cluster


No comments:

Post a Comment